401trg / utilitiesLinks
This repository contains tools used by 401trg.
☆20Updated 4 years ago
Alternatives and similar repositories for utilities
Users that are interested in utilities are comparing it to the libraries listed below
Sorting:
- Bro PCAP Processing and Tagging API☆28Updated 8 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆25Updated 2 years ago
- ☆13Updated 6 years ago
- ☆42Updated 3 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Updated 3 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Updated 5 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- Detect Phishing with Bro IDS☆19Updated 8 years ago
- Public rules and samples for various automations through LimaCharlie.io☆14Updated 4 years ago
- Presentation materials for talks I've given.☆20Updated 6 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆40Updated 2 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 5 years ago
- THOR MITRE ATT&CK Framework Coverage☆25Updated 5 years ago
- Crack your macros like the math pros.☆33Updated 8 years ago
- Parses Java Cache IDX files☆40Updated 7 years ago
- Detect kerberos attacks in pcap files☆29Updated 10 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 5 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- Various snippets created during malware analysis☆22Updated 7 years ago
- This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.☆35Updated 6 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 6 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Updated 5 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆16Updated 7 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Updated 8 years ago
- Cybersecurity Incidents Mind Maps☆34Updated 4 years ago
- DeployREMnux is a Python script that will deploy a cloud instance of the public REMnux distribution in the Amazon cloud (AWS).☆16Updated 6 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 7 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 7 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆42Updated 7 years ago